Method and system for email privacy, security, and information theft detection

a technology for email privacy applied in the field of method and system for email privacy, security, and information theft detection, can solve the problems of not taking an active approach to validating senders, misusing has no method of stopping the tide of unwanted emails,

Active Publication Date: 2016-03-31
MIRAGE DATA INC
View PDF10 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]System and Methods consistent with the present invention, as embodied and broadly described herein, provide email communication privacy and security while detecting information theft. The system comprises: an email server, wherein the email server accepts emails universally on a generated email address; an application server, wherein the application server verifies the validity of an email address for one or more user sending email, and; a database, wherein the database stores pertinent system information and email management information. Disclosed are means of processing email messages to enable encryption, spam detection, geographical location identification of users, social networking and more.

Problems solved by technology

Internet users may use one or more email addresses but generally limit their use to a handful of addresses.
If any of these individuals begin sending unwanted email or if their accounts are compromised and a recipient's address is harvested by identity thieves or spammers, the individual whose information has been compromised or is being misused has no method of stopping the tide of unwanted email other than changing their email address.
This is a cumbersome approach to solving the problem to maintaining email address security and privacy and does not accomplish the goal aside from a small window of time when no information is compromised.
But these approaches do not take an active approach to validating senders before accepting their email content for delivery to the recipient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for email privacy, security, and information theft detection
  • Method and system for email privacy, security, and information theft detection
  • Method and system for email privacy, security, and information theft detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Embodiments of the invention will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.

[0025]In the following description, numerous specific details are set forth. However, it is to be understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have been shown in detail in order not to obscure an understanding of this description.

[0026]As used in the specification and the appended claims, the singular forms “a,”“an” and “the” include plural referents unless the context clearly dictates otherwise. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method is proposed for managing email messages across a network. The system provides multiple means of verifying an originating sender of email. In addition, the system automatically generates unique email addresses as a means mask the email address of an original sender and shield users from unwanted email. The system may also be configured to block email security threats (e.g. phishing, spear phishing, etc.). Further, the system provides means of processing email messages to enable encryption, spam detection, geographical location identification of users, and social networking

Description

CLAIM OF PRIORITY[0001]This application claims priority from U.S. Provisional Patent Application 62 / 055,847, filed Sep. 26, 2014, which is relied upon and incorporated herein in its entirety by reference.FIELD OF THE INVENTION[0002]The present invention generally relates to a method and system for automatically generating unique email addresses as a way to shield users from unwanted email (junk, spam, or other unwanted email) as well as blocking email security threats (phishing, spear phishing, etc.). Unwanted emails are further analyzed to understand what users are leaking contact information to others as a way to identify security issues.BACKGROUND OF THE INVENTION[0003]Internet users may use one or more email addresses but generally limit their use to a handful of addresses. These addresses are used for different purposes ranging from personal email, work email, email addresses for websites, and other uses. All of these addresses are given to a wide range of senders within that u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/145H04L51/36H04L63/1483H04L63/105H04L63/1466H04L51/12G06F21/36H04L63/0414H04L63/08G06F2221/2133H04L63/126H04L51/212H04L51/48H04L51/56
Inventor PAREKH, SANJAY, M.
Owner MIRAGE DATA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products